Main Article Content
User authentication is one of the most significant issues in the field of Information Security. The most common and convenient authentication method used is the alphanumeric password which has significant drawbacks. To overcome the vulnerabilities of traditional methods, graphical password schemes have been developed as possible alternative solutions to text-based scheme. A potential drawback of graphical password schemes is that they are more vulnerable to shoulder surfing than conventional alphanumeric text passwords due to their visual interface. To overcome the shortcoming of existing graphical password schemes this project focuses on developing a graphical authentication system that is resistant to shoulder surfing attack.
Hu W, Wu X, Wei G. The security analysis of graphical passwords. International Conference on Communications and Intelligence Information Security, pages 2010;200-203.
Pering T, Murali S, John L, Roy W. Photographic authentication through untrusted terminals. Pervasive Computing, IEEE and IEE Communications Society. 2003;2:30-36.
Dhamija R, Perrig A. Déjà Vu: A user study using images for authentication. Proceedings of the 9th Conference on USENIX Security Symposium. 2000;9:4-4.
Davis D, Monrose F, Michael KR. On user choice in graphical password schemes. Proceedings of the 13th Usenix Security Symposium. San Diego, CA, 2004. 2004;13:11-11.
Goldberg J, Hagman J, Sazawal V. Doodling our way to better authentication. ACM Conference on Human Factors in Computing Systems (CHI); 2002.
Yokota K, Yonekura T. A proposal of COMPASS (community portrait authentic-cation system), International Conference on Cyber worlds; 2005.
Lashkari AH, Samaneh F, Rosli S, Zakaria OB. Shoulder surfing attack in graphical password authentication. International Journal of Computer Science and Information Security, (IJCSIS). 2009;6(2): 145-154.
[ISSN: 1947 5500]
Thorpe J, Oorschot PCV. Towards secure design choices for implementing graphical passwords. Proceedings of the 20th Annual Computer Security Applications Conference. 2004;50-60.
Muhammad DH, Abdul HA, Norafida I, Hazinah KM. Towards identifying usability and security features of graphical password in knowledge based authentic-cation technique. Proceedings of the 2nd Asian International Conference on Modeling and Simulation. 2008;396-403.
Suo X, Zhu Y, Owen GS. Graphical passwords: A survey. Proceedings of the 21st Annual Computer Security Applications Conference. 2005;463-472.
Susan W, Jim W, Birget JC, Alex B, Nasir M. Authentication using graphical passwords: Basic results. In Human-Computer Interaction International Conference, Las Vergas; 2005.
Susan W, Birget JC, Brodskiy A. Authentication using graphical passwords: Effects of tolerance and image choice. Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, PA, USA; 2005.
Farnaz T, Maslin M. A survey on recognition-based graphical user authentication algorithms. International Journal of Computer Science and Information Security (IJCSIS). 2009;6(2).
Radhika, Siddhartha SB. Comparative study of graphical user authentication approaches. International Journal of Computer Science and Mobile Computing (IJCSMC). 2014;3(9):361–375.
Xiaoyuan S, Ying Z, et al. Graphical passwords: A survey. Computer Security Applications Conference, 21st Annual; 2005.
Blonder G. Graphical passwords. US Patent 5 559961; 1996.
Jermyn I, Alain M, Fabian M, Michael KR, Aviel DR. The design and analysis of graphical passwords. Proceedings of the 8th USENIX Security Symposium, 1999;8:1-1.